Sciweavers

397 search results - page 2 / 80
» Refinement Types for Secure Implementations
Sort
View
JNSM
2007
65views more  JNSM 2007»
13 years 4 months ago
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
Romain Laborde, Michel Kamel, François Barr...
OOPSLA
2004
Springer
13 years 10 months ago
Efficient data race and deadlock prevention in concurrent object-oriented programs
The main goal of this PhD thesis is to propose and implement a methodology for the construction of programs based on the SCOOP model, and for modular reasoning about their correct...
Piotr Nienaltowski
ESORICS
2005
Springer
13 years 10 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
IJACT
2008
83views more  IJACT 2008»
13 years 4 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
13 years 8 months ago
Dynamic data type refinement methodology for systematic performance-energy design exploration of network applications
Network applications are becoming increasingly popular in the embedded systems domain requiring high performance, which leads to high energy consumption. In networks is observed t...
Alexandros Bartzas, Stylianos Mamagkakis, Georgios...